Preventing illegal distribution of copy protected content

a technology of copy protection and content, applied in the field of copy protection, can solve the problems of creating a tremendous risk of content piracy, piracy may arise, and risk of piracy

Inactive Publication Date: 2007-02-08
GOOGLE LLC
View PDF29 Cites 166 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While the video-on-demand market stream provides new opportunity for profits to content owners, it also creates a tremendous risk for piracy of the content.
Such risk for piracy may arise at any place in the market stream that the content is exposed.
For example, such piracy may arise when the end-user attempts to redistribute the content to another end-user improperly.
Without appropriate protection, the content can be illicitly copied, and redistributed, thus depriving content owners of their profits.
Furthermore, the content owner is often unable to determine where in the market stream the content was used in an unauthorized manner.
Without a way of determining where a security breach arose, the content owner may be unable to take appropriate action to minimize further piracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Preventing illegal distribution of copy protected content
  • Preventing illegal distribution of copy protected content
  • Preventing illegal distribution of copy protected content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention now will be described more fully hereinafter “with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific exemplary embodiments by which the invention may be practiced. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Among other things, the present invention may be embodied as methods or devices. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. The following detailed description is, therefore, not to be taken in a limiting sense.

[0015] Throughout the specification and claims, the following terms take the me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Method and devices are directed to invention is directed towards analyzing packets on-the-fly for pirated content. Packets are intercepted and analyzed to determine if the packets include media content. If media content is detected, a comparator determines a fingerprint associated with the media content. The comparator then compares the determined fingerprint to other fingerprints within a data store. If a match is found, forensic information may be collected. Piracy detection responses may also be performed, including: blocking transmission of the media content, providing a piracy alert message, degrading a quality of the media content, or including within the media content a watermark and/or fingerprint. In one embodiment, the packet analysis and the comparator may reside within a same or different device within a path between a source device and a destination device to enable piracy detection to be performed in real-time.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] The present application claims benefit of provisional application Ser. No. 60 / 706,492 entitled “Method To Prevent Illegal Distribution Of Copy Protected Content,” filed on Aug. 8, 2005, the benefit of the earlier filing date of which is hereby claimed under 35 U.S.C. § 119 (e) and 37 C.F.R. §1.78, and which is further incorporated by reference.FIELD OF THE INVENTION [0002] The present invention relates generally to digital copy protection and more particularly, but not exclusively, to employing unique identifiers to detect and / or deter illegal distribution of selected digital content. BACKGROUND OF THE INVENTION [0003] Recent advances in the telecommunications and electronics industry, and, in particular, improvements in digital compression techniques, networking, and hard drive capacities have led to growth in new digital services to a user's home. For example, such advances have provided hundreds of cable television channels to users ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00
CPCG06F2221/0737H04L63/1408G06F2221/2135G06F2221/2101G06F21/16H04L9/32H04L9/00G06F21/00
Inventor MORTEN, GLENN A.
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products